On Key Management and Tokenization
August 17, 2012 | POSTED BY JERALD DAWKINS IN SECURITY, ENCRYPTION, TOKENIZATION
I often get into debates on the use of encryption and it being the panacea of data protection. While encryption has proven itself a viable solution for many years, the problem is never in the algorithm, but rather in the management of the keys. In order...READ MORE +
Chronicles of DefCon
August 17, 2012 | POSTED BY JASON STAGGS IN EVENTS
Jason Staggs is a current participant in True's formal internship program and attended DefCon20 as part of his internship experience.
DefCon20 blew me away. Being my first hacker conference I was unsure of what to expect. After numerous talks, events...READ MORE +
U.S. Navy Contracts to Build Tools for Extracting Info from Video Game Systems
June 07, 2012 | POSTED BY JASON STAGGS IN PRIVACY, TERRORISM, SOCIAL NETWORKS
Before deciding to participate in your favorite online games, you might be interested to know what the government is potentially cooking up that would potentially allow them to monitor your online gaming activities.
According to an article on ZDNet, Th...READ MORE +